Exploiting the leakage: analysis of some authenticated encryption schemes (Q1989638)
From MaRDI portal
![]() | This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Exploiting the leakage: analysis of some authenticated encryption schemes |
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Exploiting the leakage: analysis of some authenticated encryption schemes |
scientific article |
Statements
Exploiting the leakage: analysis of some authenticated encryption schemes (English)
0 references
26 October 2018
0 references
AEGIS
0 references
Deoxys
0 references
Joltik
0 references
ELmD
0 references
side-channel
0 references
DPA
0 references
CPA
0 references